US20080022391A1 - VPN discovery server - Google Patents

VPN discovery server Download PDF

Info

Publication number
US20080022391A1
US20080022391A1 US11/447,092 US44709206A US2008022391A1 US 20080022391 A1 US20080022391 A1 US 20080022391A1 US 44709206 A US44709206 A US 44709206A US 2008022391 A1 US2008022391 A1 US 2008022391A1
Authority
US
United States
Prior art keywords
vpn
vpn gateway
network
gateways
gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11/447,092
Other versions
US8296839B2 (en
Inventor
William C. Sax
William Wollman
Egil H. Jegers
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mitre Corp
Original Assignee
Mitre Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitre Corp filed Critical Mitre Corp
Priority to US11/447,092 priority Critical patent/US8296839B2/en
Assigned to MITRE CORPORATION, THE reassignment MITRE CORPORATION, THE ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SAX, WILLIAM C., JEGERS, EGIL H., WOLLMAN, WILLIAM
Publication of US20080022391A1 publication Critical patent/US20080022391A1/en
Application granted granted Critical
Publication of US8296839B2 publication Critical patent/US8296839B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/4675Dynamic sharing of VLAN information amongst network nodes
    • H04L12/4679Arrangements for the registration or de-registration of VLAN attribute values, e.g. VLAN identifiers, port VLAN membership
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/04Interdomain routing, e.g. hierarchical routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks

Definitions

  • the present invention relates generally to secure routing. More particularly, the invention relates to a Virtual Private Network (VPN) discovery server for enabling efficient routing between VPNs.
  • VPN Virtual Private Network
  • VPN gateways are used in commercial internets, government enterprise networks, and military tactical networks. VPN gateways provide security and privacy for IP data traffic when enclaves of higher security levels (protected networks) must use networks of lower security levels for communication (e.g., corporate networks using the Internet for data transport).
  • VPN gateways isolate the routing information of higher security networks from being visible in lower security transport networks.
  • a VPN gateway may provide a protected enclave an IP Secure (IPSec) encryption service.
  • IPSec IP Secure
  • routing between protected enclaves entails being able to map remote protected enclaves (Plain Text (PT) networks) to corresponding VPN gateways having Cipher Text (CT) network addresses.
  • PT Pein Text
  • CT Cipher Text
  • SAs security associations
  • protocols for enabling robust routing in networks implementing VPN gateways need to be easy to implement, deploy, manage and configure.
  • the present invention provides methods and systems for enabling routing among a plurality of protected enclaves, each supported by one or more secure gateways, over an unsecured network.
  • Methods and systems according to the present invention achieve key routing requirements while presenting solutions that can be readily scaled to large network environments.
  • the present invention provides methods and systems for implementing a Prefix Discovery Server (PDS) that enables the mapping of Plain Text (PT) networks to secure gateways, maintains current network routing information, and assists VPN gateways in determining routes and VPN connections to remote protected enclaves.
  • PDS Prefix Discovery Server
  • PT Plain Text
  • FIG. 1 illustrates an example topology that employs VPN gateways to enable secure communication between protected enclaves over an unsecured network.
  • FIG. 2 illustrates an example topology that employs VPN gateways to enable secure communication between Plain Text (PT) networks over a Cipher Text (CT) network.
  • PT Plain Text
  • CT Cipher Text
  • FIG. 3 illustrates an example topology that employs VPN Discovery Servers to enable secure communication between protected enclaves over an unsecured network.
  • FIG. 4A illustrates an example topology of Plain Text (PT)/Cipher Text (CT) concatenated networks.
  • PT Plain Text
  • CT Cipher Text
  • FIG. 4B is an example that illustrates routing adaptability to topology changes in the example topology of FIG. 4A .
  • FIG. 5 is a process flowchart that illustrates a method for enabling robust routing between protected enclaves over an unsecured network.
  • VPN gateways are used in commercial internets, government enterprise networks, and military tactical networks. VPN gateways provide security and privacy for IP data traffic when enclaves of higher security levels (protected networks) must use networks of lower security levels for communication (e.g., corporate networks using the Internet for data transport).
  • VPN gateways When used in highly dynamic networks, such as military tactical networks, certain key routing requirements must be achieved. These include, for example, easily discovering VPN gateways and their protected enclaves once connected to the network, detecting failed or “dead” VPN gateways, and adapting security associations (SAs) (connection-specific parameters) among VPN gateways according to changes in VPN gateway network topology and/or network conditions. In addition to these routing requirements, management and operations requirements for VPN gateways must be minimized.
  • SAs security associations
  • FIG. 1 illustrates an example topology 100 that employs VPN gateways to enable secure communication between protected enclaves over an unsecured network.
  • a protected enclave refers to a group of one or more secure networks. Secure networks are also referred to as Plain Text (PT) networks since data traffic within said networks is typically not encrypted.
  • PT Plain Text
  • a protected enclave includes one or more network prefixes (network addresses).
  • protected enclaves 102 , 104 , 106 , and 108 communicate over an unsecured black core network 110 .
  • Each protected enclave 102 , 104 , 106 , and 108 employs a VPN gateway 112 , 114 , 116 , and 118 , respectively.
  • the VPN gateway provides the protected enclave with an IP Security (IP Sec) encryption service. Accordingly, data traffic originating from one of the protected enclaves and traversing black core network 110 is encrypted by its corresponding VPN gateway.
  • IP Sec IP Security
  • a VPN gateway may support one or more protected enclaves.
  • a protected enclave may have access to one or more VPN gateways.
  • a protected enclave may use two VPN gateways to receive encrypted data traffic from other protected enclaves, wherein each VPN gateway is dedicated to delivering data traffic of a pre-determined type.
  • VPN tunnels provide authenticated encryption/decryption services to the protected enclaves.
  • protected enclaves 102 and 104 communicate using VPN tunnel 120 over black core network 110 .
  • VPN tunnel 120 is set up between VPN gateways 112 and 114 , which support protected enclaves 102 and 104 , respectively.
  • FIG. 2 is another example topology 200 that employs VPN gateways to enable secure communication between protected enclaves over an unsecured network.
  • protected enclaves communicate over the Internet 202 , which is a low security level network.
  • VPN gateway 204 supports a first protected enclave, which includes network 210 .
  • VPN gateway 206 supports a second protected enclave, which includes networks 212 and 214 .
  • VPN gateway 208 supports a third protected enclave, which includes network 216 .
  • a plurality of routers 218 may be used within a protected enclave, as needed, to route traffic to networks within the enclave.
  • traffic originating from network 210 (within the first protected enclave) and destined to network 212 (within the second protected enclave) is encrypted by VPN gateway 204 , before being transmitted over the Internet 202 to VPN gateway 206 .
  • VPN gateway 204 Typically, a VPN tunnel (not shown in FIG. 2 ) is set up between VPN gateways 204 and 206 .
  • the encrypted data traffic is decrypted and routed to network 212 .
  • Inherent within this process is the ability of network 210 to determine a correct routing path to network 212 over network topology 200 . This includes having knowledge at network 210 of VPN gateways that support and reach network 212 .
  • routing in a network that uses VPN gateways entails having sufficient information about the VPN gateway topology.
  • VPN gateways may be configured with pre-determined routes to reach remote protected enclaves in the network.
  • VPN gateways share routing information with each other in order for each VPN gateway to generate a complete view of the network topology, based on which routing is performed.
  • Peer discovery is the process by which a source VPN gateway locates a corresponding target VPN gateway in a Cipher Text (CT) domain that reaches a target host for which traffic is intended. While routing technology is adequate for the proper delivery of IP traffic in the absence of secure VPNs, the use of VPN tunnels may create routing problems. For example, IP addressing is no longer transparent from end-to-end due to encryption in VPN tunnels or the use of (RFC 1918) private IP address space.
  • SA Adaptive Security Association
  • Robust networks leveraging VPN gateways must be able to adapt to changes in network topology and/or network conditions. This includes adapting to the addition, failure, or mobility of network infrastructure that affect routing paths in the network. Further, networks must be able to monitor the performance of established routes (e.g., VPN tunnels), modify settings (Security Associations) associated with these routes, or establish better routes when necessary.
  • established routes e.g., VPN tunnels
  • modify settings Security Associations
  • Detection of peers which have failed, or are no longer reachable is necessary in any type of network in order to avoid single point communication failures. This is particularly required in networks that leverage VPN gateways. For example, a VPN gateway may not be able to determine that a SA is no longer valid and to initiate a new SA without the ability to detect failed peers.
  • VPN gateways Resources required for management and operations of VPN gateways must be minimized. In military tactical networks, for example, management is a critical concern. This is due to the difficulty of configuring and maintaining military tactical networks given their high operational tempo and the limited availability of properly cleared and experienced personnel.
  • the present invention provides methods and systems for enabling routing among a plurality of protected enclaves, each supported by one or more VPN gateways, over an unsecured network.
  • Methods and systems according to the present invention achieve the above described key routing requirements while presenting solutions that can be readily scaled to large network environments.
  • PDS Prefix Discovery Server
  • PT Plain Text
  • VPN gateways that support these networks, maintains current network routing information, and assists VPN gateways in determining routes to remote protected enclaves.
  • the VPN-based PDS allows for a fewer number of VPN gateways to be employed and eliminates the need for backup gateways. This is the case since the PDS allows for more efficient utilization of VPN gateways and for dynamic switching of traffic among gateways. Further, the PDS improves network scalability as it enables load-balancing among VPN gateways and requires minimal configuration for adding new or removing VPN gateways.
  • FIG. 3 illustrates an example topology 300 that employs VPN-based Prefix Discovery Servers (PDSs) to enable secure communication between protected enclaves over an unsecured network.
  • PDSs Prefix Discovery Servers
  • Example topology 300 includes PDSs 302 and 304 , protected networks 314 , 316 and 318 , VPN gateways 306 , 308 , 310 , and 312 , and a plurality of routers 320 for routing data traffic between the different elements of topology 300 .
  • Network 314 is supported by VPN gateway 312 .
  • Networks 316 and Z 318 are supported by VPN gateway 308 .
  • links connecting VPN gateways to their protected networks e.g., links connecting VPN gateway 312 to network 314
  • links connecting VPN gateways to each other e.g., links connecting VPN gateway 312 to VPN gateway 306
  • a method for enabling robust routing among a plurality of protected enclaves, wherein each of the protected enclaves is supported by one or more Virtual Private Network (VPN) gateways will now be provided, according to an embodiment of the present invention.
  • the method is illustrated by process flowchart 500 of FIG. 5 , and will be described with continued reference to example topology 300 of FIG. 3 .
  • VPN Virtual Private Network
  • Process flowchart 500 begins in step 502 , which includes registering a VPN gateway with one or more servers.
  • the servers are VPN-based Prefix Discovery Servers.
  • step 502 is achieved by the VPN gateway contacting the nearest PDS server and registering with the server network prefixes for which it provides reachability.
  • VPN gateway 312 contacts PDS 302 to register network 314 .
  • VPN gateway 308 contacts PDS 304 to register networks 316 and 318 .
  • the VPN gateway is pre-configured with a set of reachable or supported network prefixes to register with the PDS.
  • the VPN gateway dynamically discovers reachable network prefixes through participation in the interior routing protocol of the protected enclaves directly attached thereto.
  • the VPN gateway may register with one or more servers. Further, the VPN gateway registration may include registering with the PDS server(s) one or more metrics associated with the VPN gateway. These metrics may include, among others, application types supported by the gateway, traffic types supported by the gateway, prefix administrative costs associated with the gateway, and/or preference values associated with the gateway.
  • metrics are assigned to the VPN gateway by the enclaves or networks that it supports.
  • a multi-homed enclave (supported by more than one gateway) can configure a first VPN gateway to support Voice over IP and/or video teleconferencing, a second VPN gateway to support inbound web server requests, and a third VPN gateway to support all other inbound and outbound traffic.
  • a protected enclave may use a preference value to distinguish one VPN gateway as preferred over another. This preference value combined with traffic differentiators (used to route traffic through gateways according to traffic type) provides a VPN gateway with layer 4 switching functionality.
  • the preference value may be used by a multi-home enclave to enabling load-balancing
  • Process flowchart 500 continues at the PDS side, and in step 504 includes generating mappings between network prefixes and VPN gateways.
  • the mappings may be in the form of prefix routing tables that indicate for each known prefix in the network the one or more VPN gateways that may reach that prefix.
  • the mappings may also include associated metrics as indicated during registration.
  • the mappings are referred to as plain text to cipher text mappings.
  • the PDS may be configured to push the generated mappings (and associated metrics) to all VPN gateways registered therewith.
  • a VPN gateway may query the PDS for mappings for one or more remote network prefixes.
  • the VPN gateway informs the PDS during registration whether or not it will query for prefixes or expect periodical registration updates from the server.
  • step 506 of process flowchart 500 includes transmitting the generated mappings to the VPN gateway by the PDS server(s).
  • PDSs may also share generated mappings among each other. For example, as shown in FIG. 3 , PDS 304 and PDS 302 exchange registration information with one another. PDSs may then additionally distribute to VPN gateways mappings learned from other PDS servers in step 506 .
  • the PDS may periodically update its mappings based on detected changes in VPN gateway topology. For example, when a VPN gateway de-registers itself and its supported enclaves from a PDS, the PDS may update its mappings and inform VPN gateways that received mappings from it of any changes.
  • Process flowchart 500 continues in step 508 , which includes receiving the transmitted mappings at the VPN gateway, and distributing the mappings to networks or enclaves supported by the VPN gateway.
  • the VPN gateway upon receiving the mappings, uses the received mappings to discover peer VPN gateways in the network.
  • the VPN gateway is configured to distribute received mappings using the interior routing protocols of enclaves directly attached thereto.
  • the metrics associated with the mappings may have to be modified according to the type of routing protocol used within each enclave before distribution. This may be necessary when enclaves supported by a VPN gateway each uses a different interior routing protocol. For example, one enclave may use Routing Information Protocol (RIP) metrics while another may use (Open Shortest Path First) OSPF metrics. In other embodiments, the metrics learned from the PDS(s) are distributed without modification to the enclaves.
  • RIP Routing Information Protocol
  • OSPF Open Shortest Path First
  • This local enclave distribution function combined with the ability of VPN gateways to perform metric-based prefix registration as described above, permits routing to occur through multiple sets of PT/CT concatenated networks, as will be further described below.
  • the VPN gateway may have the PDS(s) periodically forward thereto registration updates or may query the PDS(s), on-demand, for addresses of remote VPN gateways given a remote network prefix that it is trying to reach. Based on the information received from the PDS(s), the VPN gateway may select a peer VPN gateway for communicating with the remote network prefix. The selected peer VPN gateway is one that may reach the remote network prefix.
  • step 510 of process flowchart 500 includes selecting, given a destination network prefix, a first remote VPN gateway for reaching said destination network prefix from said VPN gateway.
  • selecting the remote VPN gateway is done according to one or more metrics as described above: application types supported by the remote gateway, traffic types supported by the remote gateway, a prefix administrative cost associated with the remote gateway, and/or a preference value associated with the remote gateway.
  • a PDS server may provide a source VPN gateway with both multiple prefix administrative costs for a set of remote VPN gateways and multiple preference levels for traffic differentiators for the same set of remote VPN gateways, given a destination network prefix reachable by the set of remote VPN gateways.
  • the source VPN gateway may then select the remote peer for communicating with the destination prefix by traffic differentiation and then by prefix administrative cost.
  • SA Security Association
  • the VPN gateway proceeds, in step 512 , to establish a first security association (SA) between itself and the first remote VPN gateway.
  • SA represents a group of security settings related to a VPN tunnel established between the VPN gateway and the first remote VPN gateway.
  • the SA is an IPSec SA.
  • step 512 includes receiving the selected first remote VPN gateway's cipher text address and public key. Messages are then exchanged between the VPN gateway and the first remote VPN gateway to negotiate the VPN tunnel. The public key will be used for encrypting/decrypting traffic between the two gateways.
  • the VPN gateway uses IPSec dead peer detection or equivalent functionality to help assess the health of the connection and permit peer failure detection.
  • IPSec dead peer detection exchanges periodic keep-alive type messages through the VPN tunnel when there is no traffic flowing. If there is no response from the remote gateway within a configured time, the tunnel is deleted.
  • process 500 includes measuring a performance level of the first SA, and comparing the measured performance to a threshold. Based on the result of the comparison in step 516 , the VPN gateway may decide either to maintain the current first SA, or to proceed in step 518 to modifying the first SA or canceling the first SA and establishing a second SA with a second remote VPN gateway that supports the destination network prefix. Alternatively, the VPN gateway may determine to switch from the first SA to the second SA solely based upon an expected positive change in performance level. In this case, step 516 may be omitted in process flowchart 500 .
  • Methods and systems, according to the present invention allow for seamless routing through concatenated PT/CT networks. This, as described above, is due to the ability of VPN gateways to perform metric-based prefix registration combined with local enclave distribution and inter-PDS(s) exchange of registration information. Accordingly, VPN tunnels can be established to connect remote protected enclaves that are separated by more than one unsecured networks. In addition, VPN tunnels between remote gateways may be adapted according to changes in network topology and/or network conditions. This is further illustrated below with reference to FIGS. 4A and 4B .
  • FIG. 4A illustrates an example topology 400 of Plain Text (PT)/Cipher Text (CT) concatenated networks.
  • Topology 400 includes a plurality of PT networks 410 , 412 , and 414 , Prefix Discovery Servers 402 and 404 , and Secure Gateways 416 , 418 , 420 , 422 , 424 , and 426 .
  • a high speed low latency network GIG 406 and a moderate speed high latency satellite network 408 serve as transport networks between PT networks 410 , 412 , and 414 .
  • GIG 406 and satellite network 408 represent CT networks.
  • Secure gateways 416 and 418 support PT network 410 with secure gateway 416 being a primary gateway and secure gateway 418 being a backup gateway. Similarly, secure gateways 422 and 424 support PT network 414 , and secure gateways 426 and 420 support PT network 412 .
  • the secure gateways Prior to routing over topology 400 , the secure gateways perform a metric-based registration, as described above, with servers 402 and 404 .
  • the secure gateways register with the nearest PDS.
  • secure gateways 416 , 418 , 420 , and 422 register with server 402 .
  • Secure gateways 424 and 426 register with server 404 .
  • prefix routing table 428 As shown in FIG. 4A , the registration results in prefix routing tables 428 and 430 at servers 402 and 404 , respectively.
  • prefix routing table 428 secure gateway 416 registers network prefix R 1 with an associated metric of 2.
  • Secure gateway 418 registers network prefix R 1 with an associated metric of 6. This is because secure gateway 416 as the primary is preferred to secure gateway 418 , which is the backup.
  • routes between PT networks are determined according to the metrics provided in the prefix routing tables with routes associated with lower cost metrics preferred to ones with higher cost metrics. Other factors may be considered when a plurality of routes with same cost metrics exist.
  • PT network 414 may communicate with PT network 412 by setting up a secure tunnel between secure gateways 424 and 426 over satellite network 408 .
  • Secure gateway 426 advertises a cost metric of 2 for reaching PT network 412 (prefix R 3 ) in prefix routing table 430 .
  • PT network 414 may communicate with PT network 412 by setting up a secure tunnel between secure gateways 422 and 420 over GIG network 406 .
  • Secure gateway 420 also advertises a cost metric of 2 for reaching PT network 412 (prefix R 3 ) in prefix routing table 428 . Accordingly, network 414 may use other factors to determine the optimal route to network 412 . In the specific example of FIG. 4A , network 414 may select the route over GIG network 406 due to GIG 406 being a high speed low latency network, for example. Similarly, network 412 may prefer secure gateway 420 for communication with networks 410 and 414 , but employs secure gateway 426 as an alternate.
  • an important feature according to the present invention is the ability to dynamically adapt secure tunnels between protected enclaves according to changes in network topology and/or network conditions. This, as discussed above, is due to VPN gateways having the ability to discover peer gateways, detect failed peers, periodically receive registration updates from PDSs, and continuously monitor the performance of setup secure tunnels.
  • FIG. 4B is an example that illustrates routing adaptability to topology changes in the example topology of FIG. 4A .
  • a link failure causes secure gateway 420 to lose its link to GIG network 406 .
  • This link failure causes a change in network topology. Specifically, the link failure results in PT network 412 losing its preferred route to PT networks 410 and 414 .
  • PT network 412 may detect the link failure after several keep-alive messages to network 410 over a secure tunnel between secure gateways 420 and 416 are unanswered. Subsequently, PT network 412 may query server 404 for an alternative gateway that may reach network 410 . A new route that now spans both satellite network 408 and GIG network 406 and comprising three VPN tunnels (between secure gateways 426 - 424 , 424 - 422 , and 422 - 416 ) is established between PT networks 412 and 410 , as shown in FIG. 4B .

Abstract

Methods and systems for enabling robust routing between protected enclaves over an unsecured network are provided herein. In one aspect, the present invention provides methods and systems for enabling routing among a plurality of protected enclaves, each supported by one or more secure gateways, over an unsecured network. Methods and systems according to the present invention achieve key routing requirements while presenting solutions that can be readily scaled to large network environments. In another aspect, the present invention provides methods and systems for implementing a Prefix Discovery Server (PDS) that enables the mapping of Plain Text (PT) networks to secure gateways, maintains current network routing information, and assists VPN gateways in determining routes to remote protected enclaves.

Description

    STATEMENT REGARDING FEDERALLY-SPONSORED RESEARCH AND DEVELOPMENT
  • The U.S. government has a paid-up license in this invention and the right in limited circumstances to require the patent owner to license others on reasonable terms as provided for by the terms of Contract No. 0705M880-W1 awarded by the United States Army.
  • FIELD OF THE INVENTION
  • The present invention relates generally to secure routing. More particularly, the invention relates to a Virtual Private Network (VPN) discovery server for enabling efficient routing between VPNs.
  • BACKGROUND OF THE INVENTION
  • VPN gateways are used in commercial internets, government enterprise networks, and military tactical networks. VPN gateways provide security and privacy for IP data traffic when enclaves of higher security levels (protected networks) must use networks of lower security levels for communication (e.g., corporate networks using the Internet for data transport).
  • Typically, VPN gateways isolate the routing information of higher security networks from being visible in lower security transport networks. For example, a VPN gateway may provide a protected enclave an IP Secure (IPSec) encryption service. Accordingly, routing between protected enclaves entails being able to map remote protected enclaves (Plain Text (PT) networks) to corresponding VPN gateways having Cipher Text (CT) network addresses.
  • While this may be a straightforward task in static networks, several key requirements need to be present in order to enable robust routing between protected enclaves in dynamic networks, such as military tactical networks, for example. These requirements include, for example, easily discovering peer VPN gateways and their protected enclaves once connected to the network, detecting failed or “dead” peer VPN gateways, and adapting security associations (SAs) (a group of security settings related to a VPN tunnel) among VPN gateways according to changes in VPN gateway network topology and/or network conditions.
  • Further, in networks having high operational tempo, such as military tactical networks, for example, management and configuration required for realizing the above described requirements is a critical concern. Accordingly, protocols for enabling robust routing in networks implementing VPN gateways need to be easy to implement, deploy, manage and configure.
  • What is needed therefore are methods and systems for enabling robust routing between protected enclaves using VPN gateways while satisfying the above described requirements.
  • BRIEF SUMMARY OF THE INVENTION
  • Methods and systems for enabling robust routing between protected enclaves over an unsecured network are provided herein.
  • In one aspect, the present invention provides methods and systems for enabling routing among a plurality of protected enclaves, each supported by one or more secure gateways, over an unsecured network. Methods and systems according to the present invention achieve key routing requirements while presenting solutions that can be readily scaled to large network environments.
  • In another aspect, the present invention provides methods and systems for implementing a Prefix Discovery Server (PDS) that enables the mapping of Plain Text (PT) networks to secure gateways, maintains current network routing information, and assists VPN gateways in determining routes and VPN connections to remote protected enclaves.
  • Further embodiments, features, and advantages of the present invention, as well as the structure and operation of the various embodiments of the present invention, are described in detail below with reference to the accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES
  • The accompanying drawings, which are incorporated herein and form a part of the specification, illustrate the present invention and, together with the description, further serve to explain the principles of the invention and to enable a person skilled in the pertinent art to make and use the invention.
  • FIG. 1 illustrates an example topology that employs VPN gateways to enable secure communication between protected enclaves over an unsecured network.
  • FIG. 2 illustrates an example topology that employs VPN gateways to enable secure communication between Plain Text (PT) networks over a Cipher Text (CT) network.
  • FIG. 3 illustrates an example topology that employs VPN Discovery Servers to enable secure communication between protected enclaves over an unsecured network.
  • FIG. 4A illustrates an example topology of Plain Text (PT)/Cipher Text (CT) concatenated networks.
  • FIG. 4B is an example that illustrates routing adaptability to topology changes in the example topology of FIG. 4A.
  • FIG. 5 is a process flowchart that illustrates a method for enabling robust routing between protected enclaves over an unsecured network.
  • The present invention will be described with reference to the accompanying drawings. The drawing in which an element first appears is typically indicated by the leftmost digit(s) in the corresponding reference number.
  • DETAILED DESCRIPTION OF THE INVENTION 1. Introduction
  • VPN gateways are used in commercial internets, government enterprise networks, and military tactical networks. VPN gateways provide security and privacy for IP data traffic when enclaves of higher security levels (protected networks) must use networks of lower security levels for communication (e.g., corporate networks using the Internet for data transport).
  • When used in highly dynamic networks, such as military tactical networks, certain key routing requirements must be achieved. These include, for example, easily discovering VPN gateways and their protected enclaves once connected to the network, detecting failed or “dead” VPN gateways, and adapting security associations (SAs) (connection-specific parameters) among VPN gateways according to changes in VPN gateway network topology and/or network conditions. In addition to these routing requirements, management and operations requirements for VPN gateways must be minimized.
  • FIG. 1 illustrates an example topology 100 that employs VPN gateways to enable secure communication between protected enclaves over an unsecured network. When used herein, a protected enclave refers to a group of one or more secure networks. Secure networks are also referred to as Plain Text (PT) networks since data traffic within said networks is typically not encrypted. A protected enclave includes one or more network prefixes (network addresses).
  • In FIG. 1, protected enclaves 102, 104, 106, and 108 communicate over an unsecured black core network 110. Each protected enclave 102, 104, 106, and 108 employs a VPN gateway 112, 114, 116, and 118, respectively. The VPN gateway provides the protected enclave with an IP Security (IP Sec) encryption service. Accordingly, data traffic originating from one of the protected enclaves and traversing black core network 110 is encrypted by its corresponding VPN gateway.
  • A VPN gateway may support one or more protected enclaves. In turn, a protected enclave may have access to one or more VPN gateways. For example, a protected enclave may use two VPN gateways to receive encrypted data traffic from other protected enclaves, wherein each VPN gateway is dedicated to delivering data traffic of a pre-determined type.
  • Typically, communication between protected enclaves is achieved by setting up VPN tunnels between VPN gateways that support the communicating enclaves. VPN tunnels provide authenticated encryption/decryption services to the protected enclaves. Referring to the example of FIG. 1, protected enclaves 102 and 104 communicate using VPN tunnel 120 over black core network 110. VPN tunnel 120 is set up between VPN gateways 112 and 114, which support protected enclaves 102 and 104, respectively.
  • FIG. 2 is another example topology 200 that employs VPN gateways to enable secure communication between protected enclaves over an unsecured network. In the example of FIG. 2, protected enclaves communicate over the Internet 202, which is a low security level network. VPN gateway 204 supports a first protected enclave, which includes network 210. VPN gateway 206 supports a second protected enclave, which includes networks 212 and 214. VPN gateway 208 supports a third protected enclave, which includes network 216. A plurality of routers 218, as shown in FIG. 2, may be used within a protected enclave, as needed, to route traffic to networks within the enclave.
  • In an exemplary communication between protected enclaves in FIG. 2, traffic originating from network 210 (within the first protected enclave) and destined to network 212 (within the second protected enclave) is encrypted by VPN gateway 204, before being transmitted over the Internet 202 to VPN gateway 206. Typically, a VPN tunnel (not shown in FIG. 2) is set up between VPN gateways 204 and 206. Once received at VPN gateway 206, the encrypted data traffic is decrypted and routed to network 212. Inherent within this process is the ability of network 210 to determine a correct routing path to network 212 over network topology 200. This includes having knowledge at network 210 of VPN gateways that support and reach network 212.
  • Accordingly, routing in a network that uses VPN gateways, such as network topology 200 for example, entails having sufficient information about the VPN gateway topology.
  • In static networks with little or no changes in network topology (including prefixes and VPN gateways), VPN gateways may be configured with pre-determined routes to reach remote protected enclaves in the network. Alternatively, VPN gateways share routing information with each other in order for each VPN gateway to generate a complete view of the network topology, based on which routing is performed.
  • While these approaches may be suitable for static networks, dynamic networks with frequently changing topology require more adaptive techniques for enabling robust routing between protected enclaves in a network using VPN gateways. Several key routing requirements, discussed in more detail below, need to be present for dynamic networks.
  • Peer Discovery
  • Peer discovery is the process by which a source VPN gateway locates a corresponding target VPN gateway in a Cipher Text (CT) domain that reaches a target host for which traffic is intended. While routing technology is adequate for the proper delivery of IP traffic in the absence of secure VPNs, the use of VPN tunnels may create routing problems. For example, IP addressing is no longer transparent from end-to-end due to encryption in VPN tunnels or the use of (RFC 1918) private IP address space.
  • Adaptive Security Association (SA) Management
  • Robust networks leveraging VPN gateways must be able to adapt to changes in network topology and/or network conditions. This includes adapting to the addition, failure, or mobility of network infrastructure that affect routing paths in the network. Further, networks must be able to monitor the performance of established routes (e.g., VPN tunnels), modify settings (Security Associations) associated with these routes, or establish better routes when necessary.
  • Peer Failure Detection
  • Detection of peers which have failed, or are no longer reachable, is necessary in any type of network in order to avoid single point communication failures. This is particularly required in networks that leverage VPN gateways. For example, a VPN gateway may not be able to determine that a SA is no longer valid and to initiate a new SA without the ability to detect failed peers.
  • Management and Operations
  • Resources required for management and operations of VPN gateways must be minimized. In military tactical networks, for example, management is a critical concern. This is due to the difficulty of configuring and maintaining military tactical networks given their high operational tempo and the limited availability of properly cleared and experienced personnel.
  • 2. VPN Discovery Server
  • The present invention provides methods and systems for enabling routing among a plurality of protected enclaves, each supported by one or more VPN gateways, over an unsecured network. Methods and systems according to the present invention achieve the above described key routing requirements while presenting solutions that can be readily scaled to large network environments.
  • In an embodiment of the present invention, methods and systems are provided for implementing a VPN-based Prefix Discovery Server (PDS) that enables the mapping of Plain Text (PT) or protected networks to VPN gateways that support these networks, maintains current network routing information, and assists VPN gateways in determining routes to remote protected enclaves.
  • In other embodiments, the VPN-based PDS allows for a fewer number of VPN gateways to be employed and eliminates the need for backup gateways. This is the case since the PDS allows for more efficient utilization of VPN gateways and for dynamic switching of traffic among gateways. Further, the PDS improves network scalability as it enables load-balancing among VPN gateways and requires minimal configuration for adding new or removing VPN gateways.
  • 2.1 Exemplary Topology
  • FIG. 3 illustrates an example topology 300 that employs VPN-based Prefix Discovery Servers (PDSs) to enable secure communication between protected enclaves over an unsecured network.
  • Example topology 300 includes PDSs 302 and 304, protected networks 314, 316 and 318, VPN gateways 306, 308, 310, and 312, and a plurality of routers 320 for routing data traffic between the different elements of topology 300.
  • Network 314 is supported by VPN gateway 312. Networks 316 and Z 318 are supported by VPN gateway 308. Accordingly, in example topology 300, links connecting VPN gateways to their protected networks (e.g., links connecting VPN gateway 312 to network 314) represent secure links. Data traffic is not encrypted over these links. On the other hand, links connecting VPN gateways to each other (e.g., links connecting VPN gateway 312 to VPN gateway 306) are unsecured links and data traffic needs to be encrypted when routed over these links.
  • 2.2 Method Embodiments
  • A method for enabling robust routing among a plurality of protected enclaves, wherein each of the protected enclaves is supported by one or more Virtual Private Network (VPN) gateways will now be provided, according to an embodiment of the present invention. The method is illustrated by process flowchart 500 of FIG. 5, and will be described with continued reference to example topology 300 of FIG. 3.
  • PDS Registration
  • Process flowchart 500 begins in step 502, which includes registering a VPN gateway with one or more servers. In an embodiment, the servers are VPN-based Prefix Discovery Servers. Typically, step 502 is achieved by the VPN gateway contacting the nearest PDS server and registering with the server network prefixes for which it provides reachability. Referring to FIG. 3, for example, VPN gateway 312 contacts PDS 302 to register network 314. Similarly, VPN gateway 308 contacts PDS 304 to register networks 316 and 318. In embodiments, the VPN gateway is pre-configured with a set of reachable or supported network prefixes to register with the PDS. In other embodiments, the VPN gateway dynamically discovers reachable network prefixes through participation in the interior routing protocol of the protected enclaves directly attached thereto.
  • The VPN gateway may register with one or more servers. Further, the VPN gateway registration may include registering with the PDS server(s) one or more metrics associated with the VPN gateway. These metrics may include, among others, application types supported by the gateway, traffic types supported by the gateway, prefix administrative costs associated with the gateway, and/or preference values associated with the gateway.
  • Typically, metrics are assigned to the VPN gateway by the enclaves or networks that it supports. Accordingly, for example, a multi-homed enclave (supported by more than one gateway) can configure a first VPN gateway to support Voice over IP and/or video teleconferencing, a second VPN gateway to support inbound web server requests, and a third VPN gateway to support all other inbound and outbound traffic. Similarly, a protected enclave may use a preference value to distinguish one VPN gateway as preferred over another. This preference value combined with traffic differentiators (used to route traffic through gateways according to traffic type) provides a VPN gateway with layer 4 switching functionality. In other embodiments, the preference value may be used by a multi-home enclave to enabling load-balancing
  • Process flowchart 500 continues at the PDS side, and in step 504 includes generating mappings between network prefixes and VPN gateways. The mappings may be in the form of prefix routing tables that indicate for each known prefix in the network the one or more VPN gateways that may reach that prefix. The mappings may also include associated metrics as indicated during registration. In embodiments, the mappings are referred to as plain text to cipher text mappings.
  • The PDS may be configured to push the generated mappings (and associated metrics) to all VPN gateways registered therewith. Alternatively, a VPN gateway may query the PDS for mappings for one or more remote network prefixes. In an embodiment, the VPN gateway informs the PDS during registration whether or not it will query for prefixes or expect periodical registration updates from the server. Accordingly, step 506 of process flowchart 500 includes transmitting the generated mappings to the VPN gateway by the PDS server(s). It is noted that PDSs may also share generated mappings among each other. For example, as shown in FIG. 3, PDS 304 and PDS 302 exchange registration information with one another. PDSs may then additionally distribute to VPN gateways mappings learned from other PDS servers in step 506.
  • In addition, the PDS may periodically update its mappings based on detected changes in VPN gateway topology. For example, when a VPN gateway de-registers itself and its supported enclaves from a PDS, the PDS may update its mappings and inform VPN gateways that received mappings from it of any changes.
  • Peer Discovery and Local Enclave Distribution
  • Process flowchart 500 continues in step 508, which includes receiving the transmitted mappings at the VPN gateway, and distributing the mappings to networks or enclaves supported by the VPN gateway. In an embodiment, the VPN gateway, upon receiving the mappings, uses the received mappings to discover peer VPN gateways in the network.
  • In another embodiment, the VPN gateway is configured to distribute received mappings using the interior routing protocols of enclaves directly attached thereto. In embodiments, the metrics associated with the mappings may have to be modified according to the type of routing protocol used within each enclave before distribution. This may be necessary when enclaves supported by a VPN gateway each uses a different interior routing protocol. For example, one enclave may use Routing Information Protocol (RIP) metrics while another may use (Open Shortest Path First) OSPF metrics. In other embodiments, the metrics learned from the PDS(s) are distributed without modification to the enclaves.
  • This local enclave distribution function, combined with the ability of VPN gateways to perform metric-based prefix registration as described above, permits routing to occur through multiple sets of PT/CT concatenated networks, as will be further described below.
  • Peer Gateway Selection
  • Routing between protected enclaves according to an embodiment of the present invention will now be described with continued reference to process flowchart 500.
  • As described above, the VPN gateway may have the PDS(s) periodically forward thereto registration updates or may query the PDS(s), on-demand, for addresses of remote VPN gateways given a remote network prefix that it is trying to reach. Based on the information received from the PDS(s), the VPN gateway may select a peer VPN gateway for communicating with the remote network prefix. The selected peer VPN gateway is one that may reach the remote network prefix.
  • Accordingly, step 510 of process flowchart 500 includes selecting, given a destination network prefix, a first remote VPN gateway for reaching said destination network prefix from said VPN gateway. In an embodiment, selecting the remote VPN gateway is done according to one or more metrics as described above: application types supported by the remote gateway, traffic types supported by the remote gateway, a prefix administrative cost associated with the remote gateway, and/or a preference value associated with the remote gateway.
  • For example, a PDS server may provide a source VPN gateway with both multiple prefix administrative costs for a set of remote VPN gateways and multiple preference levels for traffic differentiators for the same set of remote VPN gateways, given a destination network prefix reachable by the set of remote VPN gateways. The source VPN gateway may then select the remote peer for communicating with the destination prefix by traffic differentiation and then by prefix administrative cost.
  • Security Association (SA) Setup and Management
  • Once the VPN gateway has selected in step 510 the first remote VPN gateway for reaching the destination network prefix, the VPN gateway proceeds, in step 512, to establish a first security association (SA) between itself and the first remote VPN gateway. The SA represents a group of security settings related to a VPN tunnel established between the VPN gateway and the first remote VPN gateway. In an embodiment, the SA is an IPSec SA.
  • Typically, step 512 includes receiving the selected first remote VPN gateway's cipher text address and public key. Messages are then exchanged between the VPN gateway and the first remote VPN gateway to negotiate the VPN tunnel. The public key will be used for encrypting/decrypting traffic between the two gateways.
  • After the SA has been established, the VPN gateway uses IPSec dead peer detection or equivalent functionality to help assess the health of the connection and permit peer failure detection. IPSec dead peer detection exchanges periodic keep-alive type messages through the VPN tunnel when there is no traffic flowing. If there is no response from the remote gateway within a configured time, the tunnel is deleted.
  • Further, the VPN periodically queries the PDS(s) to determine if a better remote VPN gateway is available to replace the current first remote VPN gateway. Accordingly, in an embodiment as in step 514, process 500 includes measuring a performance level of the first SA, and comparing the measured performance to a threshold. Based on the result of the comparison in step 516, the VPN gateway may decide either to maintain the current first SA, or to proceed in step 518 to modifying the first SA or canceling the first SA and establishing a second SA with a second remote VPN gateway that supports the destination network prefix. Alternatively, the VPN gateway may determine to switch from the first SA to the second SA solely based upon an expected positive change in performance level. In this case, step 516 may be omitted in process flowchart 500.
  • Routing in PT/CT Concatenated Networks
  • Methods and systems, according to the present invention, allow for seamless routing through concatenated PT/CT networks. This, as described above, is due to the ability of VPN gateways to perform metric-based prefix registration combined with local enclave distribution and inter-PDS(s) exchange of registration information. Accordingly, VPN tunnels can be established to connect remote protected enclaves that are separated by more than one unsecured networks. In addition, VPN tunnels between remote gateways may be adapted according to changes in network topology and/or network conditions. This is further illustrated below with reference to FIGS. 4A and 4B.
  • FIG. 4A illustrates an example topology 400 of Plain Text (PT)/Cipher Text (CT) concatenated networks. Topology 400 includes a plurality of PT networks 410, 412, and 414, Prefix Discovery Servers 402 and 404, and Secure Gateways 416, 418, 420, 422, 424, and 426.
  • A high speed low latency network GIG 406 and a moderate speed high latency satellite network 408 serve as transport networks between PT networks 410, 412, and 414. GIG 406 and satellite network 408 represent CT networks.
  • Secure gateways 416 and 418 support PT network 410 with secure gateway 416 being a primary gateway and secure gateway 418 being a backup gateway. Similarly, secure gateways 422 and 424 support PT network 414, and secure gateways 426 and 420 support PT network 412.
  • Prior to routing over topology 400, the secure gateways perform a metric-based registration, as described above, with servers 402 and 404. The secure gateways register with the nearest PDS. In the example of FIG. 4A, secure gateways 416, 418, 420, and 422 register with server 402. Secure gateways 424 and 426 register with server 404.
  • As shown in FIG. 4A, the registration results in prefix routing tables 428 and 430 at servers 402 and 404, respectively. Referring to prefix routing table 428, secure gateway 416 registers network prefix R1 with an associated metric of 2. Secure gateway 418 registers network prefix R1 with an associated metric of 6. This is because secure gateway 416 as the primary is preferred to secure gateway 418, which is the backup.
  • Typically, routes between PT networks are determined according to the metrics provided in the prefix routing tables with routes associated with lower cost metrics preferred to ones with higher cost metrics. Other factors may be considered when a plurality of routes with same cost metrics exist. Referring to FIG. 4A for example, note that PT network 414 may communicate with PT network 412 by setting up a secure tunnel between secure gateways 424 and 426 over satellite network 408. Secure gateway 426 advertises a cost metric of 2 for reaching PT network 412 (prefix R3) in prefix routing table 430. Similarly, PT network 414 may communicate with PT network 412 by setting up a secure tunnel between secure gateways 422 and 420 over GIG network 406. Secure gateway 420 also advertises a cost metric of 2 for reaching PT network 412 (prefix R3) in prefix routing table 428. Accordingly, network 414 may use other factors to determine the optimal route to network 412. In the specific example of FIG. 4A, network 414 may select the route over GIG network 406 due to GIG 406 being a high speed low latency network, for example. Similarly, network 412 may prefer secure gateway 420 for communication with networks 410 and 414, but employs secure gateway 426 as an alternate.
  • As described above, an important feature according to the present invention is the ability to dynamically adapt secure tunnels between protected enclaves according to changes in network topology and/or network conditions. This, as discussed above, is due to VPN gateways having the ability to discover peer gateways, detect failed peers, periodically receive registration updates from PDSs, and continuously monitor the performance of setup secure tunnels.
  • FIG. 4B is an example that illustrates routing adaptability to topology changes in the example topology of FIG. 4A. In the example of FIG. 4B, a link failure causes secure gateway 420 to lose its link to GIG network 406. This link failure causes a change in network topology. Specifically, the link failure results in PT network 412 losing its preferred route to PT networks 410 and 414.
  • In an example, PT network 412 may detect the link failure after several keep-alive messages to network 410 over a secure tunnel between secure gateways 420 and 416 are unanswered. Subsequently, PT network 412 may query server 404 for an alternative gateway that may reach network 410. A new route that now spans both satellite network 408 and GIG network 406 and comprising three VPN tunnels (between secure gateways 426-424, 424-422, and 422-416) is established between PT networks 412 and 410, as shown in FIG. 4B.
  • CONCLUSION
  • While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example only, and not limitation. It will be apparent to persons skilled in the relevant art that various changes in form and detail can be made therein without departing from the spirit and scope of the invention. Thus, the breadth and scope of the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.

Claims (27)

1. A method for enabling routing among a plurality of protected enclaves, wherein each of the protected enclaves is supported by one or more Virtual Private Network (VPN) gateways of a plurality of VPN gateways, the method comprising:
(a) registering a VPN gateway with one or more servers;
(b) receiving, at said VPN gateway, registration information of other VPN gateways of said plurality of VPN gateways; and
(c) determining using said received registration information routing paths between protected enclaves supported by said VPN gateway and other protected enclaves of said plurality of protected enclaves.
2. The method of claim 1, wherein step (a) further comprises registering, with said one or more servers, network prefixes within said protected enclaves supported by said VPN gateway, wherein said network prefixes are reachable by said VPN gateway.
3. The method of claim 2, further comprising:
pre-configuring said VPN gateway with a set of reachable network prefixes.
4. The method of claim 2, further comprising:
dynamically discovering reachable network prefixes at said VPN gateway.
5. The method of claim 2, wherein step (a) further comprises registering, with said one or more servers, one or more metrics associated with said VPN gateway.
6. The method of claim 5, wherein said one more metrics include one or more of application types supported by said VPN gateway, traffic types supported by said VPN gateway, prefix administrative costs associated with said VPN gateway, and preference values associated with said VPN gateway.
7. The method of claim 2, further comprising generating mappings between network prefixes and VPN gateways that reach said prefixes, and wherein said mappings have associated metrics for using said VPN gateways to reach said prefixes.
8. The method of claim 7, further comprising transmitting mappings and associated metrics by said one or more servers to said VPN gateway.
9. The method of claim 8, further comprising periodically distributing said generated mappings and associated metrics to said plurality of VPN gateways.
9. The method of claim 8, further comprising querying, given a network prefix, said one or more servers for mappings and associated metrics to reach said network prefix from said VPN gateway.
10. The method of claim 8, further comprising:
receiving the transmitted mappings and associated metrics by said VPN gateway; and
distributing said received mappings and associated metrics to protected enclaves supported by said VPN gateway.
11. The method of claim 10, further comprising:
selecting, given a network prefix, a first remote VPN gateway for reaching said network prefix from said VPN gateway; and
establishing a first security association (SA) between said VPN gateway and said first remote VPN gateway.
12. The method of claim 11, wherein said selecting step comprises selecting said first remote VPN gateway according to one or more of application types supported by said first remote VPN gateway, traffic types supported by said first remote VPN gateway, prefix administrative costs associated with said first remote VPN gateway, and preference values associated with said first remote VPN gateway.
13. The method of claim 11, further comprising:
measuring a performance level of said first SA; and
comparing said measured performance level to a threshold.
14. The method of claim 13, further comprising, if said measured performance level is lower than said threshold:
modifying said first SA; or
canceling said first SA and establishing a second SA between said VPN gateway and a second remote VPN gateway, wherein said second remote VPN gateway reaches said network prefix.
15. A system for enabling routing among a plurality of protected enclaves, wherein each of said protected enclaves is supported by one or more Virtual Private Network (VPN) gateways, the system comprising:
a plurality of VPN gateways, wherein each of said plurality of VPN gateways reaches one or more network prefixes within said plurality of protected enclaves; and
one or more prefix discovery servers (PDS);
wherein each of said plurality of VPN gateways registers reachable network prefixes within said protected enclaves, with said one or more PDS(s).
16. The system of claim 15, wherein each of said one or more PDS(s) further comprises:
means for generating mappings between network prefixes and VPN gateways that reach said prefixes, and wherein said mappings have associated metrics for using said VPN gateways to reach said prefixes.
17. The system of claim 16, wherein each of said one or more PDS(s) further comprises:
means for distributing said generated mappings and associated metrics to VPN gateways.
18. The system of claim 17, further comprising:
means for selecting, given a network prefix, a first remote VPN gateway for reaching said network prefix based on said generated mappings and associated metrics; and
means for establishing a first security association (SA) with said first remote VPN gateway.
19. The system of claim 18, wherein said selecting means comprises means for selecting said first remote VPN gateway according to one or more of application types supported by said first remote VPN gateway, traffic types supported by said first remote VPN gateway, prefix administrative costs associated with said first remote VPN gateway, and preference values associated with said first remote VPN gateway.
20. The system of claim 18, further comprising:
means for measuring a performance level of said first SA;
means for modifying said first SA according to said measured performance level;
means for canceling said first SA according to said measured performance level.
21. A method for enabling routing among a plurality of protected enclaves, wherein each of the protected enclaves is supported by one or more Virtual Private Network (VPN) gateways of a plurality of VPN gateways, the method comprising:
(a) receiving registration requests from VPN gateways, wherein each of said registration requests includes network prefixes within said protected enclaves reachable by the VPN gateway that initiated that registration request;
(b) generating mappings between network prefixes and VPN gateways that reach said prefixes, wherein said mappings have associated metrics for using said VPN gateways to reach said prefixes; and
(c) transmitting the generated mappings to VPN gateways from which registration requests were received.
22. The method of claim 21, wherein steps (a)-(c) are performed by a Prefix Discovery Server (PDS).
23. The method of claim 22, further comprising:
(d) exchanging the generated mappings with other Prefix Discovery Servers.
24. The method of claim 21, further comprising:
(d) dynamically updating the generated mappings based on changes in network conditions and/or topology.
25. The method of claim 24, further comprising:
(e) periodically distributing the generated mappings to registered VPN gateways.
26. The method of claim 24, further comprising:
(e) receiving a query from a VPN gateway, wherein said query includes a target network prefix; and
(f) transmitting to said VPN gateway mappings associated with said target network prefix, wherein said mappings include addresses of VPN gateways that reach said target network prefix.
US11/447,092 2006-06-06 2006-06-06 VPN discovery server Active 2029-10-07 US8296839B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/447,092 US8296839B2 (en) 2006-06-06 2006-06-06 VPN discovery server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/447,092 US8296839B2 (en) 2006-06-06 2006-06-06 VPN discovery server

Publications (2)

Publication Number Publication Date
US20080022391A1 true US20080022391A1 (en) 2008-01-24
US8296839B2 US8296839B2 (en) 2012-10-23

Family

ID=38972918

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/447,092 Active 2029-10-07 US8296839B2 (en) 2006-06-06 2006-06-06 VPN discovery server

Country Status (1)

Country Link
US (1) US8296839B2 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080037481A1 (en) * 2006-06-30 2008-02-14 Wei-Kuo Chiang Method and apparatus for mobility management in communication networks
US20100306572A1 (en) * 2009-06-01 2010-12-02 Alexandro Salvarani Apparatus and method to facilitate high availability in secure network transport
US20100318799A1 (en) * 2009-06-11 2010-12-16 Microsoft Corporation Discovery of secure network enclaves
US20110066851A1 (en) * 2009-09-14 2011-03-17 International Business Machines Corporation Secure Route Discovery Node and Policing Mechanism
US20110096695A1 (en) * 2009-10-22 2011-04-28 Srikanth Natarajan Method and system for discovering a pure hub-and-spoke topology
US7953070B1 (en) * 2006-08-17 2011-05-31 Avaya Inc. Client configuration download for VPN voice gateways
US20130315249A1 (en) * 2011-02-08 2013-11-28 Murata Machinery, Ltd. Relay server and relay communication system
US20140095862A1 (en) * 2012-09-28 2014-04-03 Hangzhou H3C Technologies Co., Ltd. Security association detection for internet protocol security
US20150180832A1 (en) * 2013-12-23 2015-06-25 Samsung Sds Co., Ltd. System and method for controlling virtual private network access
US9742560B2 (en) 2009-06-11 2017-08-22 Microsoft Technology Licensing, Llc Key management in secure network enclaves
US20180131572A1 (en) * 2006-12-29 2018-05-10 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US20180152320A1 (en) * 2016-11-29 2018-05-31 Ale International System for and method of establishing a connection between a first electronic device and a second electronic device
US10166572B2 (en) 2006-12-29 2019-01-01 Kip Prod P1 Lp Display inserts, overlays, and graphical user interfaces for multimedia systems
US10403394B2 (en) 2006-12-29 2019-09-03 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US11316688B2 (en) 2006-12-29 2022-04-26 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US11783925B2 (en) 2006-12-29 2023-10-10 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US11943351B2 (en) 2006-12-29 2024-03-26 Kip Prod P1 Lp Multi-services application gateway and system employing the same

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9438564B1 (en) 2012-09-18 2016-09-06 Google Inc. Managing pooled VPN proxy servers by a central server
CN104823412B (en) * 2012-10-10 2018-09-04 诺基亚通信公司 Peer-to-peer brings back to life the method and device of detection

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020099937A1 (en) * 2000-04-12 2002-07-25 Mark Tuomenoksa Methods and systems for using names in virtual networks
US20020112189A1 (en) * 2001-02-13 2002-08-15 Tuomo Syvanne Synchronization of security gateway state information
US20030041238A1 (en) * 2001-08-15 2003-02-27 International Business Machines Corporation Method and system for managing resources using geographic location information within a network management framework
US20030093691A1 (en) * 2001-11-13 2003-05-15 Reefedge, Inc., A Delaware Corporation Enabling secure communication in a clustered or distributed architecture
US6631416B2 (en) * 2000-04-12 2003-10-07 Openreach Inc. Methods and systems for enabling a tunnel between two computers on a network
US20040122976A1 (en) * 2002-10-24 2004-06-24 Ashutosh Dutta Integrated mobility management
US6889321B1 (en) * 1999-12-30 2005-05-03 At&T Corp. Protected IP telephony calls using encryption
US20060041761A1 (en) * 2004-08-17 2006-02-23 Neumann William C System for secure computing using defense-in-depth architecture
US20060185012A1 (en) * 2003-03-27 2006-08-17 Alexis Olivereau Communication betweeen a private network and a roaming mobile terminal
US20060195896A1 (en) * 2004-12-22 2006-08-31 Wake Forest University Method, systems, and computer program products for implementing function-parallel network firewall
US20070294757A1 (en) * 2000-06-14 2007-12-20 Stephens Daniel G Jr System and method for secure management of remote systems
US7373660B1 (en) * 2003-08-26 2008-05-13 Cisco Technology, Inc. Methods and apparatus to distribute policy information
US7665132B2 (en) * 2003-07-04 2010-02-16 Nippon Telegraph And Telephone Corporation Remote access VPN mediation method and mediation device
US7860114B1 (en) * 1999-11-08 2010-12-28 Verizon Business Global Llc Method and system for dynamic gateway selection in an IP telephony network

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7860114B1 (en) * 1999-11-08 2010-12-28 Verizon Business Global Llc Method and system for dynamic gateway selection in an IP telephony network
US6889321B1 (en) * 1999-12-30 2005-05-03 At&T Corp. Protected IP telephony calls using encryption
US20020099937A1 (en) * 2000-04-12 2002-07-25 Mark Tuomenoksa Methods and systems for using names in virtual networks
US6631416B2 (en) * 2000-04-12 2003-10-07 Openreach Inc. Methods and systems for enabling a tunnel between two computers on a network
US20070294757A1 (en) * 2000-06-14 2007-12-20 Stephens Daniel G Jr System and method for secure management of remote systems
US20020112189A1 (en) * 2001-02-13 2002-08-15 Tuomo Syvanne Synchronization of security gateway state information
US20030041238A1 (en) * 2001-08-15 2003-02-27 International Business Machines Corporation Method and system for managing resources using geographic location information within a network management framework
US20030093691A1 (en) * 2001-11-13 2003-05-15 Reefedge, Inc., A Delaware Corporation Enabling secure communication in a clustered or distributed architecture
US20040122976A1 (en) * 2002-10-24 2004-06-24 Ashutosh Dutta Integrated mobility management
US20060185012A1 (en) * 2003-03-27 2006-08-17 Alexis Olivereau Communication betweeen a private network and a roaming mobile terminal
US7665132B2 (en) * 2003-07-04 2010-02-16 Nippon Telegraph And Telephone Corporation Remote access VPN mediation method and mediation device
US7373660B1 (en) * 2003-08-26 2008-05-13 Cisco Technology, Inc. Methods and apparatus to distribute policy information
US20060041761A1 (en) * 2004-08-17 2006-02-23 Neumann William C System for secure computing using defense-in-depth architecture
US20060195896A1 (en) * 2004-12-22 2006-08-31 Wake Forest University Method, systems, and computer program products for implementing function-parallel network firewall

Cited By (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080037481A1 (en) * 2006-06-30 2008-02-14 Wei-Kuo Chiang Method and apparatus for mobility management in communication networks
US8369292B2 (en) * 2006-06-30 2013-02-05 Industrial Technology Research Institute Method and apparatus for mobility management in communication networks
US7953070B1 (en) * 2006-08-17 2011-05-31 Avaya Inc. Client configuration download for VPN voice gateways
US11363318B2 (en) 2006-12-29 2022-06-14 Kip Prod Pi Lp Display inserts, overlays, and graphical user interfaces for multimedia systems
US10361877B2 (en) 2006-12-29 2019-07-23 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US11943351B2 (en) 2006-12-29 2024-03-26 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US11876637B2 (en) 2006-12-29 2024-01-16 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US11792035B2 (en) 2006-12-29 2023-10-17 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US11783925B2 (en) 2006-12-29 2023-10-10 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US10785050B2 (en) 2006-12-29 2020-09-22 Kip Prod P1 Lp Multi-services gateway device at user premises
US11750412B2 (en) 2006-12-29 2023-09-05 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US11695585B2 (en) 2006-12-29 2023-07-04 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US11588658B2 (en) 2006-12-29 2023-02-21 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US11582057B2 (en) 2006-12-29 2023-02-14 Kip Prod Pi Lp Multi-services gateway device at user premises
US11533190B2 (en) 2006-12-29 2022-12-20 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US11527311B2 (en) 2006-12-29 2022-12-13 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US11489689B2 (en) 2006-12-29 2022-11-01 Kip Prod Pi Lp System and method for providing network support services and premises gateway support infrastructure
US20180131572A1 (en) * 2006-12-29 2018-05-10 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US11457259B2 (en) 2006-12-29 2022-09-27 Kip Prod P1 Lp Display inserts, overlays, and graphical user interfaces for multimedia systems
US10166572B2 (en) 2006-12-29 2019-01-01 Kip Prod P1 Lp Display inserts, overlays, and graphical user interfaces for multimedia systems
US10225096B2 (en) 2006-12-29 2019-03-05 Kip Prod Pi Lp System and method for providing network support services and premises gateway support infrastructure
US10263803B2 (en) 2006-12-29 2019-04-16 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US10812283B2 (en) 2006-12-29 2020-10-20 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US10403394B2 (en) 2006-12-29 2019-09-03 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US10530600B2 (en) 2006-12-29 2020-01-07 Kip Prod P1 Lp Systems and method for providing network support services and premises gateway support infrastructure
US10530598B2 (en) 2006-12-29 2020-01-07 Kip Prod P1 Lp Voice control of endpoint devices through a multi-services gateway device at the user premises
US11381414B2 (en) 2006-12-29 2022-07-05 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US10630501B2 (en) 2006-12-29 2020-04-21 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US10646897B2 (en) 2006-12-29 2020-05-12 Kip Prod P1 Lp Display inserts, overlays, and graphical user interfaces for multimedia systems
US10673645B2 (en) 2006-12-29 2020-06-02 Kip Prod Pi Lp Systems and method for providing network support services and premises gateway support infrastructure
US10672508B2 (en) 2006-12-29 2020-06-02 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US10728051B2 (en) 2006-12-29 2020-07-28 Kip Prod Pi Lp System and method for providing network support services and premises gateway support infrastructure
US11362851B2 (en) 2006-12-29 2022-06-14 Kip Prod Pi Lp System and method for providing network support services and premises gateway support infrastructure
US11329840B2 (en) 2006-12-29 2022-05-10 Kip Prod P1 Lp Voice control of endpoint devices through a multi-services gateway device at the user premises
US10897373B2 (en) 2006-12-29 2021-01-19 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US11032097B2 (en) 2006-12-29 2021-06-08 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US11057237B2 (en) 2006-12-29 2021-07-06 Kip Prod Pi Lp System and method for providing network support services and premises gateway support infrastructure
US11102025B2 (en) 2006-12-29 2021-08-24 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US11164664B2 (en) 2006-12-29 2021-11-02 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US11173517B2 (en) 2006-12-29 2021-11-16 Kip Prod P1 Lp Display inserts, overlays, and graphical user interfaces for multimedia systems
US11183282B2 (en) 2006-12-29 2021-11-23 Kip Prod Pi Lp Multi-services application gateway and system employing the same
US11184188B2 (en) 2006-12-29 2021-11-23 Kip Prod Pi Lp System and method for providing network support services and premises gateway support infrastructure
US11316688B2 (en) 2006-12-29 2022-04-26 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US11323281B2 (en) 2006-12-29 2022-05-03 Kip Prod P1 Lp System and method for providing network support services and premises gateway support infrastructure
US20100306572A1 (en) * 2009-06-01 2010-12-02 Alexandro Salvarani Apparatus and method to facilitate high availability in secure network transport
US9628276B2 (en) 2009-06-11 2017-04-18 Microsoft Technology Licensing, Llc Discovery of secure network enclaves
US20100318799A1 (en) * 2009-06-11 2010-12-16 Microsoft Corporation Discovery of secure network enclaves
US9742560B2 (en) 2009-06-11 2017-08-22 Microsoft Technology Licensing, Llc Key management in secure network enclaves
US8352741B2 (en) 2009-06-11 2013-01-08 Microsoft Corporation Discovery of secure network enclaves
US20110066851A1 (en) * 2009-09-14 2011-03-17 International Business Machines Corporation Secure Route Discovery Node and Policing Mechanism
US8144624B2 (en) 2009-10-22 2012-03-27 Hewlett-Packard Development Company, L.P. Method and system for discovering a pure hub-and-spoke topology
WO2011049717A3 (en) * 2009-10-22 2011-07-21 Hewlett-Packard Development Company, L.P. Method and system for discovering a pure hub-and-spoke topology
US20110096695A1 (en) * 2009-10-22 2011-04-28 Srikanth Natarajan Method and system for discovering a pure hub-and-spoke topology
US9197557B2 (en) * 2011-02-08 2015-11-24 Murata Machinery, Ltd. Relay server and relay communication system
US20130315249A1 (en) * 2011-02-08 2013-11-28 Murata Machinery, Ltd. Relay server and relay communication system
US20140095862A1 (en) * 2012-09-28 2014-04-03 Hangzhou H3C Technologies Co., Ltd. Security association detection for internet protocol security
US20150180832A1 (en) * 2013-12-23 2015-06-25 Samsung Sds Co., Ltd. System and method for controlling virtual private network access
US9565165B2 (en) * 2013-12-23 2017-02-07 Samsung Sds Co., Ltd. System and method for controlling virtual private network access
US20180152320A1 (en) * 2016-11-29 2018-05-31 Ale International System for and method of establishing a connection between a first electronic device and a second electronic device
US10630507B2 (en) * 2016-11-29 2020-04-21 Ale International System for and method of establishing a connection between a first electronic device and a second electronic device

Also Published As

Publication number Publication date
US8296839B2 (en) 2012-10-23

Similar Documents

Publication Publication Date Title
US8296839B2 (en) VPN discovery server
USRE49485E1 (en) Overlay management protocol for secure routing based on an overlay network
Filsfils et al. Segment routing architecture
US7848335B1 (en) Automatic connected virtual private network
US7590123B2 (en) Method of providing an encrypted multipoint VPN service
US7710865B2 (en) Disaster recovery for active-standby data center using route health and BGP
US7689722B1 (en) Methods and apparatus for virtual private network fault tolerance
US7602737B2 (en) Methods and apparatus for providing an enhanced dynamic multipoint virtual private network architecture
US7620975B2 (en) Internal routing protocol support for distributing encryption information
US9762537B1 (en) Secure path selection within computer networks
US8724505B2 (en) Flexible mechanism for supporting virtual private network services based on source-independent distributed advertisements
US9654482B2 (en) Overcoming circular dependencies when bootstrapping an RPKI site
US20070097991A1 (en) Method and system for discovering and providing near real-time updates of VPN topologies
McPherson et al. Architectural considerations of IP anycast
US8788629B2 (en) HIP node reachability
US11477233B2 (en) Deploying secure neighbor discovery in EVPN
US7900250B1 (en) Method of providing secure groups using a combination of group and pair-wise keying
US8954601B1 (en) Authentication and encryption of routing protocol traffic
Rossberg et al. Distributed automatic configuration of complex ipsec-infrastructures
US7864770B1 (en) Routing messages in a zero-information nested virtual private network
Carthern et al. Advanced Routing
US10735252B2 (en) Outside router fault detection
US11411867B1 (en) Dynamically managing encryption for virtual routing (VRF) and forwarding (VRF) using route targets and unique VRF identifiers
US20230131877A1 (en) Inline security key exchange
Ginsberg et al. RFC 8402: Segment Routing Architecture

Legal Events

Date Code Title Description
AS Assignment

Owner name: MITRE CORPORATION, THE, VIRGINIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SAX, WILLIAM C.;WOLLMAN, WILLIAM;JEGERS, EGIL H.;SIGNING DATES FROM 20060522 TO 20060602;REEL/FRAME:017960/0607

Owner name: MITRE CORPORATION, THE, VIRGINIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SAX, WILLIAM C.;WOLLMAN, WILLIAM;JEGERS, EGIL H.;REEL/FRAME:017960/0607;SIGNING DATES FROM 20060522 TO 20060602

STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
FPAY Fee payment

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 8

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2553); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 12